Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
8.5 billion data records were stolen in 2019!
Security Awareness

8.5 billion data records were stolen in 2019!

In 2019, a total of 8.5 billion data records will have flowed out.85% have a single reason - wrongly configured Systems. Prepare your systems now!

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: October 7, 2024 3 min read read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)

TL;DR

An IBM X-Force study based on 70 billion security events found that 8.5 billion data records were stolen in 2019. Around 85% of breaches stemmed from misconfigured systems. Phishing and credential theft accounted for roughly one third of incidents, while scanning and exploiting unpatched vulnerabilities caused another 30%. TrickBot ranked as the most active banking Trojan. Ransomware continued its rise as a criminal business model, with attacks incapacitating institutions like the Berlin Court of Appeal.

Table of Contents (3 sections)

In 2019, a total of 8.5 billion data records will have flowed out. It is frightening to realize that 85% of the reasons for this are wrongly configured systems. It does not matter whether it is the own or external operation of servers. But also the lack of password hygiene is still a big problem.

Phishing, scanning, exploitation and reuse of access data - the biggest problems

The initial attack vector that affects has a third of the compromised accounts. The now published IBM study speaks of a total of 8.5 billion records that were stolen in 2019 alone. Scanning and exploiting vulnerabilities also resulted in 30% of data theft. It is to be observed above all that already officially patched security holes in e.g. Windows Server and Microsoft Office still lead to large thefts. But the multiple use of passwords also allows attackers to steal further data. This approach was also identified in the study. Recently, the BSI adapted the guideline with regard to the password change intervals. It is no longer required to change the password every 90 days, but only after a compromise has been detected. At the moment it has to be stated that none of the guidelines serve their purpose. The fact that the basic data protection regulation is in principle able to increase the security level can also be doubted. Numerous security gaps are also contained in the DSGVO.

Study based on 70 billion security events

In the collected data records there are further exciting findings. For example, TrickBot is classified as the most active banking Trojan. Private and public institutions are affected equally. The trend among cyber criminals is clearly towards ransom racketeering. The successful business model has been actively practiced since 2017. The most successful ransomware attacks of 2019 have temporarily incapacitated the Berlin Court of Appeal, among others. The court is still struggling with the consequences today.

Human and technical security gaps endanger business success

The latest Risk Barometer study from Allianz has already put cyber threats in first place. This circumstance forces basically all companies that plan to implement digitalization in the short, medium and long term to deal with cyber threats. It is a challenge to determine the priorities. After all, technology and people themselves are attacked at regular intervals via digital channels. For companies looking for an initial assessment of potential attack vectors, a look at RISKREX may be worthwhile. Digital Risk Management identifies technical and human security vulnerabilities and helps measure the success of IT security projects. Awareness campaigns or pentests can then be conducted.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen - CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking - Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAV